A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate an intrusion detection system (IDS) in terms of its ability to correctly classify events as normal or intrusive. Traditional metrics (e.g., true positive rate and false positive rate) measure different aspects, but no single metric seems sufficient to measure the capability of intrusion detection systems. The lack of a single unified metric makes it difficult to fine-tune and evaluate an IDS. In this paper, we provide an in-depth analysis of existing metrics. Specifically, we analyze a typical cost-based scheme [6], and demonstrate that this approach is very confusing and ineffective when the cost factor is not carefully selected. In addition,...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers f...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An object...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The problem of previous approaches in anomaly detection in Intrusion Detection System (IDS) is to pr...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers f...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An object...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The problem of previous approaches in anomaly detection in Intrusion Detection System (IDS) is to pr...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers f...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...